• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

BTEC National in IT Organisational systems security - Software and network security (P3,M2,D1)

Extracts from this document...

Introduction

1. Software and network security Handshaking: This is the process in which when a computer tries to establish a connection with another computer or device defines the rules for communication. Handshaking makes it possible for two computers or devices to connect without the need of human intervention to set parameters or rules of communication. Handshaking is the steps or verifying the connection, speed or authorization of the computer or device trying to connect to it. Diskless networks: This is where the computer at the workstation doesn?t have any form of data storage and depends on another computer such as a server to load its operating system and to access data over a network connection. This is useful as it is easy to transfer data from a computer to a mobile storage device and removes the vulnerability of PC?s in the workstation. This can also be done over the ?cloud? using applications that emulate the behaviour of your computer system. Use of backups: This is where data is copied to another storage device to ensure the data is safe and secure should system failures occur. ...read more.

Middle

This is done by the use of a tunnel which is an agreed route for encrypted traffic. This creates a trusted connection on a system which is not trusted. This helps prevent packet sniffing and fraudulent authentication. Intrusion detection systems: This monitors network activity for someone trying to break in or compromise a system. Some of these systems are passive and will record any suspicious activity for the network administrator and others are reactive which will try to reconfigure the firewall automatically to block the intrusion. Passwords: This is a word that must be entered to allow access to the system which is chosen by the user. Many organisations have password policies, for example, not to write down the password, change the password every month or so or to choose a password which is not contained within a dictionary. Many systems will lock a user out after 3 password attempt, then the user must go to the network administrator and provide suitable proof of identity and either remind the user of the password or create a new one. ...read more.

Conclusion

If the data or information has been backed up in an external media device in a safe place such as on an optical disc or on paper then the required data/information only needs to be retrieved from its safe location and the data/information is recovered, this reduces the downtime resulting from the disaster. Another form of disaster recovery is the use of a system backup, which is a mirror image of the computer systems used by the business; this means if there is a failure with one or all of the systems then the backup system can be put in place to prevent downtime caused by the failure. If damage occurs to the hardware of the system then spare parts that are kept in case of hardware failure are a good idea, however this is not very cost effective. Alternatively, in the case of a fire or flood and an entire system has been made unusable then a whole system replacement may be required, this may be stored as a backup in a safe place or bought in reaction to the disaster, this is the least effective way to prevent downtime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    In some cases the criminal will have a website set up which will require the input of banking/personal information; it will also enable the victim to view fictitious "bank accounts" with seemingly large available balances ready to transfer to him/her.

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    However should somebody request information which is covered by the FoIA law, public authorities legally have to answer any requests within 20 days. Below, is an example of the constraints within the FoIA. It also shows below, that decisions are made based on these information requests and bad decisions can then be made.

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    New device can be added to the network without the need for a lot of configuration because the work load for the system administrator is reduced by this protocol. DHCP is a really important protocol because it automatically retrieval of default gateway's, IP addresses, subnet masks and other required IP parameters.

  2. Computer systems assignment 1

    Task 2 Purpose features and functions of two operating systems Windows XP- It's an operating system which was created by Microsoft in 2001 and was a great success. This operating system is made for ordinary people performing basic tasks but is capable of much more.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    Controller has legal obligations to process the subject's employee data * or if the data subject is unable to give consent, e.g. unconscious * In order to protect the vital interests of the data subject or another person * In a case where consent on or behalf of another person has been unreasonably withheld, e.g.

  2. Explain the component parts of a computer system - Include both hardware, software and ...

    These roles are determined by the networks configuration and are: * Clients which use the network * Peers, which use and provide network resources * Servers which provide network resources There are many ways that networks can be configured. The types of computer, the way they are linked and the network technology decide this.

  1. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    The procedures must be regularly reviewed and updated, these updates need to reflect what was outlined to be improved in the review and needs to be in date with current knowledge on security threats. However, the update may have a negative impact on the existing systems and so should be tested before applied to the entire organisations systems.

  2. Small Office Network Implementation - hardware and security.

    or cable. Depending on the broadband provider, you might be required to use additional equipment such as a cable or DSL modem or a residential gateway. * Configuration simplicity- most home or small networks are not managed by an information technology (IT)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work